Sei sulla pagina 1di 4

SIKKIM MANIPAL UNIVERSITY-DE

1



1. Explain five differences between priority slots and time slots.
Answer- Priority Slot
When data packets are sent over a network, they are broken into equal-size pieces. The
message and header are attached to each packet which tell the size of the packet. When
network equipment routes the packets from the source (server) to the destination (client),
headers include three priority slots based on bits. The three priority bits enable eight levels
of priority but sometimes only four are used. Real-time files such as video are given high
priority and non-real time data is given low priority. Network equipments (switches and
routers) use various techniques to deliver high priority data over low priority. Priority QoS
(Quality of Service) prioritizes the type of information when two similar types of data streams
are sent together.
The number of slots are allocated on LAN/WAN randomly to minimize collisions. Slots are
prioritized and based on expected traffic prediction.
There is some collision detection hardware, such as sending dummy messages, that keep
slots going in the absence of network traffic.
Time Slots
The transmission time of a fixed-length physical frame is defined and prioritized as a time
slot and is used for multiplexing of user data switching over WAN. The maximum length of
an Ethernet MAC frame is exactly fixed into a physical frame time slot. It is sent to a time-
critical user data stream followed by the required QoS parameters such as throughput and
time delay.
For example, the DS0 (Digital Signal 0) time slot is used for WAN interface.
All are checked by default and arranged as slot priority. In the T1/E1 carrier, T1 provides 24
time slots of 64 Kbps for each which in total is 1536 Kbps. For E1, there are 31 time slots of
64 Kbps each for a total of 1984 Kbps.



2. What do you understand by binary synchronous control?
Answer- Binary Synchronous Communication (BSC) is known as BISYNC. It is a character
oriented protocol developed by IBM in 1967. It was announced in 1967, after the introduction
of system/360. BSC replaced the Synchronous Transmit Receive (STR) protocol. It is used
in second-generation computers.
BSC is a data communication line protocol that uses a standard set of transmission control
characters and control character sequence which is sent to binary-coded data over the
communication control line.
Functions of Binary Synchronous Communication
BSC follows half-duplex communication. It synchronizes and works with the transmitter
which sends a SYN character. The receiver receives the message and starts finding the
SYN character. The two stations handshake confirms the synchronization message. Then
they exchange data and information which are kept in character blocks. The block first finds
the SYN character. Then, the Start Of Header (SOH) marks the starting header which
contains the sequence number and the address of the transmitter and receiver. STX (Start of
TeXt) and End of TeXt (ETX) indicate the starting and ending of user data. They are in an
arbitrary sequence of characters. In BSC, the redundancy check impacts a block. Control
characters are used in user data, and Data Link Escape (DLE) is used to avoid interpreting
the control codes. If control character occurs in the user data, it is preceded by DLE
character which means that BSC is now ready to accept the next character. In the error
handling method, the receiver receives a corrupted block which returns the NAK (Negative
Acknowledged) block sequence number.
This sequence number is used to offend the block and then the transmitter retransmits that
block. Individual characters are used by parity checking.

SIKKIM MANIPAL UNIVERSITY-DE

2



3. How is a communication channel shared?
Answer- A communication channel is shared by the way of multiplexing, i.e., putting several
information on the same channel. In the context of telecommunications and computer
networks, the technique for combining either digital data streams or multiple analog
message signals into a single signal through a shared medium is termed as multiplexing or
muxing. The basic objective behind this is sharing an exclusive resource. In
telecommunications, only one wire may get used for transferring the numerous phone calls.
The signals multiplexed are sent through a communication channel that can become a
medium for physical transmission. Through multiplexing, the low-level communication
channels can be broken down into a number of higher-level logical channels so that there
can be one for every message signal or data stream for transfer of data. Another process,
that is exactly the opposite of multiplexing, called as demultiplexing, is the process of
deriving all genuine channels and shifting them to the receiver end.
Similarly, for performing the multiplexing task the device used is called as a multiplexer
(MUX) and the device used for performing the reverse process is termed as a demultiplexer
(DEMUX). Multiplexing can be basically divided into two types for both analog as well as
digital form namely Time Division Multiplexing (TDM) and Frequency Division Multiplexing
(FDM) out of which the FDM demands modulation of every signal. In context of optical
communications, FDM has been renamed as the Wavelength Division Multiplexing (WDM).
Through the use of statistical multiplexing, such as the packet mode communication,
variable bit rate digital bit streams can be efficiently transferred through a fixed bandwidth
channel. Packet mode communication is a time domain multiplexing that is a little but not
entirely the same as time division multiplexing.
Code Division Multiplexing (CDM) methods can help in transferring the digital bit streams
through an analog channel. The two types of CDM are Frequency Hopping Spread
Spectrum (FHSS) and Direct Sequence Spread Spectrum (DSSS). Multiplexing, in wireless
communications, can be done with the use of irregular polarization in different forms, such
as horizontal/vertical or clockwise/counterclockwise on every adjacent channel as well as
satellite, or by the means of a phased multi-antenna array linked to a Multiple Input Multiple
Output (MIMO) communications scheme.



4. Why client and server is considered as most powerful component for constructing
networks?
Answer- In general, a computer network is composed of one or more servers,
workstations, network interface cards, active and passive hub, routers, bridges, gateways,
modem, software components like network operating systems and other application
software. The following components are widely used to construct networks.
Client
A client is an application or system that accesses a service made available by a server. The
server is often on another computer system and the client accesses the service by way of a
network. The client-server model is still used today. Client and server can run on the same
machine and connect via other interprocess communication techniques such as shared
memory. Using the Internet sockets a user may connect to a service operating on a possibly
remote system through the Internet protocol suite. A client-server network involves multiple
clients connecting to a single, central server. The file server on a client server network is a
high capacity, high speed computer with a large hard disk capacity.
Server
It is the most powerful computer of the network. In a local area network, usually
a powerful microcomputer or a super-microcomputer with the power of a minicomputer is
used as a server. There are two types of servers normally employed in a local area network:
SIKKIM MANIPAL UNIVERSITY-DE

3

In a dedicated server, the server computer performs functions and services of the whole
network. It helps to efficiently run user applications and increases the overall system cost.
Users cannot run their applications directly in a dedicated server. It provides e-mail service,
sharing of multiple hard disks, and sharing of other resources and faster response time. For
larger networks with heavy load, dedicated servers are usually employed.
In a non-dedicated server, apart from the role of a network controller, a server also acts as
an individual workstation. The server is equipped with a large memory. Network operations
demand only a portion of server memory. The remaining portion of the memory may be used
for the user applications. Under light-load conditions, it is advisable to use a non dedicated
server. Some servers can operate on both modes, according to the requirement of the user.

File Server
The primary goal of a computer network is to share the data among several users. They also
make their attached disk drives, printers, modems and unique communication links available
to the various client stations. Providing one computer with one or more hard disks facilitates
this. All client stations share these hard disks. Clients can make their requests to access any
of the shared facility to the server. The file server is a powerful computer, which runs special
software. It provides the files and other shared resources to different users in the network. It
provides facilities like user authentication and security to various user programs and data.



5. Try to identify the areas where computer is used. Also mention the name of application
software for each type.
Answer- 10 areas where computer is used -
1. Business area
2. Medical science
3. Research
4. Banks
5. Robotics
6. New vehicle and transportation design
7. Space exploration
8. Entertainment
9. Education
10. Animation and graphic design

Application Software
Application software are developed so that computers can be applied to everyday tasks and
problems. Personal productivity programming, engineering and science applications, and
business applications can avail of computers to simplify their tasks. Personal productivity
application programs are categorized on the basis of the nature of their use in maintaining
databases, presenting graphics, generating spreadsheets and word processing. Application
software are available as a package or as a collection of programs.
Software Packages
The general purpose application software is called a software package. Since the
development of dedicated software for a specific application is very expensive, software
packages are developed to fulfill the needs of general computer users. The important
categories of software packages are given below.
Word processor
Electronic spreadsheets
Graphic, multimedia, presentation software
Database software.
The important features of these software are given below:
Word Processor: We use word processing software to prepare a document such as a
letter, memo or report. The document may be stored, edited, formatted or printed.
SIKKIM MANIPAL UNIVERSITY-DE

4

Electronic Spreadsheets: A spreadsheet is a simple worksheet comprising rows and
columns of data. The data kept in a spreadsheet is similar to the data written in a ledger
book of a bank or the marksheet of a student.
Graphic Software: Graphic software helps us to prepare automated drawings using the
computer and peripheral devices. The drawings may be stored, edited or printed.
Database Software: Database refers to a collection of data sorted in a desired order. For
example, the names of students stored in alphabetical order are a database. The data in the
database can also be modified or indexed using key fields like Name, ID Number and others.
Personal Assistance: Many software are available to store personal diary information or
keep records of schedules and contacts. Even an inventory of items can be maintained
using a computer.



6. Identify the various threats from the public internet to users
Answer- Protection of data is of paramount importance not only to business users, but also
other casual users. For example, even a student or housewife using a computer for e mailing
needs adequate data security so that their e-mails are accessible only to themselves or to
those with whom they wish to share their e-mail account.
Data security is of paramount importance for all business users. Virtually all business data,
such as clients list, suppliers lists, inventory and sales information, information about
employees, products and services, financial information, etc., is confidential. Any of this
information, if accidentally or fraudulently shared with people who are not supposed to have
access to these, can prove to be catastrophic for the business. Forget about outsiders,
wrongful access of data even within the business can prove to be disastrous. For example,
imagine the consequences of a situation where personal information of the employees is
made available to each other! With the proliferation of the Internet, data security has become
a real issue and a challenge for all Internet users worldwide. Awareness regarding the ways
to avoid and protect against such security threats needs to be spread among all the Internet
users. Generally, the various threats over the Internet can be classified into four categories:
Interruption: Making online services or connections of an organization unusable.
Interception: Accessing protected data during transmission at its source.
Modification: Altering the data for the purposes of disruption.
Fabrication: Inserting spurious data or information into an organizations system to disrupt
or overload services.
All the Internet users face some kind of security threat, though the relative importance of
each of these threats may vary from user to user. Some of the most serious threats are:
Information theft
Identity theft Spear-phishing
Financial fraud
Loss of data from malicious software Trojan, viruses and worms
Censoring data for children
Threats from the Internet gatekeepers and government agencies

Potrebbero piacerti anche